security ii web authentication
play

Security II: Web authentication Such text-based protocols can be - PowerPoint PPT Presentation

Hyper Text Transfer Protocol (HTTP) version 0.9 With HTTP, a client (web browser) contacts a server on TCP port 80, sends a request line and receives a response file. Security II: Web authentication Such text-based protocols can be


  1. Hyper Text Transfer Protocol (HTTP) – version 0.9 With HTTP, a client (“web browser”) contacts a server on TCP port 80, sends a request line and receives a response file. Security II: Web authentication Such text-based protocols can be demonstrated via generic TCP tools like “telnet” or “netcat” (which know nothing about HTTP): $ nc -C www.cl.cam.ac.uk 80 Markus Kuhn GET /~mgk25/hello.html <!DOCTYPE html> <title>Hello</title> <p>Welcome to the Computer Laboratory, University of Cambridge <a href="http://info.cern.ch/">World Wide Web</a>! $ HTTP header lines end in CR LF, which “ nc -C ” ensures on Linux. On macOS: “ nc -c ” https://www.cl.cam.ac.uk/teaching/1718/SecurityII/ Uniform Resource Locator (URL): http://www.cl.cam.ac.uk/~mgk25/hello.html These notes are provided as an aid for following the lectures, and are not a substitute for attending URL syntax: scheme:[//[user[:password]@]host[:port]][/path][?query][#fragment] Lent 2018 – Part II HTTPS uses TCP port 443 and the Transport Layer Security (TLS) protocol to authenticate the server and encrypt the HTTP connection: $ openssl s_client -crlf -connect www.cl.cam.ac.uk:443 websecurity-slides-4up.pdf 2018-02-23 11:38 fca1bee 1 2 Hyper Text Transfer Protocol (HTTP) – version 1.0 Hyper Text Transfer Protocol (HTTP) – version 1.1 Version 1.0 of the protocol is significantly more flexible and verbose: The request header can also have fields (and even a message body). $ nc -C www.cl.cam.ac.uk 80 HTTP/1.1 requires that the client identifies the server name in a Host: GET /~mgk25/hello.html HTTP/1.0 field (for servers with multiple hostnames on the same IP address): ֓ ← $ nc -C www.cl.cam.ac.uk 80 HTTP/1.1 200 OK GET /~mgk25/hello.html HTTP/1.1 Date: Mon, 19 Feb 2018 19:33:13 GMT Host: www.cl.cam.ac.uk Server: Apache/2.4.18 (Ubuntu) ֓ ← Last-Modified: Mon, 19 Feb 2018 17:49:49 GMT HTTP/1.1 200 OK Content-Length: 106 Date: Mon, 19 Feb 2018 19:53:17 GMT Content-Type: text/html; charset=utf-8 Server: Apache/2.4.18 (Ubuntu) ֓ ← Last-Modified: Mon, 19 Feb 2018 17:49:49 GMT <!DOCTYPE html> Content-Length: 106 <title>Hello</title> Content-Type: text/html; charset=utf-8 <p>Welcome to the ֓ ← <a href="http://info.cern.ch/">World Wide Web</a>! <!DOCTYPE html> ◮ The response header starts with a status-code line (“ 200 OK ”). <title>Hello</title> ◮ Headers can carry additional fields (syntax like in RFC 822 email) <p>Welcome to the ◮ Request and response headers each finish with an empty line. <a href="http://info.cern.ch/">World Wide Web</a>! Some header fields omitted in examples here for brevity. 3 4

  2. HTTP request headers HTTP state and session context In each request header, web browsers offer information about their software version, capabilities and preferences: HTTP was designed as a stateless protocol: the TCP connection may $ firefox http://localhost:8080/ & nc -C -l 8080 terminate after each request/response exchange. [2] 30280 GET / HTTP/1.1 While HTTP servers may keep a TCP connection open for a few seconds after the end of a resonse, such that the client can reuse it for another request (without having to go through the Host: localhost:8080 TCP and TLS handshake each time), this is merely a performance optimization. User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:58.0) Unlike “telnet”, “ssh” or “X11”, HTTP applications cannot rely on Gecko/20100101 Firefox/58.0 long-lived TCP sessions for context. Each HTTP request has to be Accept: text/html,application/xhtml+xml,application/xml; q=0.9,*/*;q=0.8 answered solely based on the information in its request header. Accept-Language: en-GB,en;q=0.5 HTTP clients add several request-header fields to provide web Accept-Encoding: gzip, deflate applications with longer-term context across many HTTP connections. Connection: keep-alive Upgrade-Insecure-Requests: 1 ◮ “Cookie” – server-maintained state indicators in headers ← ֓ ◮ “Referer” (sic) – where did that URL come from? HTTP/1.1 200 OK ← ֓ ◮ “Authorization” (sic) – basic password authentication Hello ^D $ “ nc -l ” listens to incoming TCP connections, like a server. Port 8080 does not require root. 5 6 HTTP cookies HTTP cookie attributes I Web browsers maintain a database table where web servers can store Servers can set multiple cookies, even at the same time, name = value entries known as cookies, as data that the browser will present to the server in future request headers: Set-Cookie: sid=hJsndj47Sd8sl3hiu; HttpOnly; Secure $ firefox http://localhost:8080/ & nc -C -l 8080 Set-Cookie: lang=en-GB [1] 31864 GET / HTTP/1.1 which clients will return as Host: localhost:8080 User-Agent: Mozilla/5.0 [...] Cookie: sid=hJsndj47Sd8sl3hiu; lang=en-GB ← ֓ The Set-Cookie: name = value information can be followed by HTTP/1.1 200 OK Set-Cookie: taste=chocolate attributes; separated by semicola. Browsers store such attributes with ← ֓ each cookie, but do not return them in the Cookie: header. Thanks! ^D Secure – this flag ensures that the cookie is only included in HTTPS $ firefox http://localhost:8080/ & nc -C -l 8080 requests, and omitted from HTTP requests. [1] 31890 GET / HTTP/1.1 Some recent browsers in addition do not allow a HTTP response to set a Secure cookie. Host: localhost:8080 User-Agent: Mozilla/5.0 [...] HttpOnly – this flag ensures that the cookie is only visible in HTTP(S) Cookie: taste=chocolate requests to servers, but not accessible to client-side JavaScript code via ← ֓ the document.cookie API. HTTP/1.1 200 OK Now try “ localhost:8081 ”, “ 127.0.0.1:8080 ” and “ [::1]:8080 ” instead. 7 8

  3. HTTP cookie attributes II HTTP cookie attributes III By default, browsers return cookies only to the server that set them, By default, cookies expire at the end of the browser session, i.e. when the recording the hostname used (but not the port). browser is closed (“session cookies”). To make them persist longer, across browser sessions, servers can specify an expiry date Servers can also limit cookies to be returned only to certain URL prefixes, e.g. if www.cl.cam.ac.uk sets Set-Cookie: lang=en; Expires=Fri, 29 Mar 2019 23:00:00 GMT Set-Cookie: lang=en; Path=/~mgk25/; Secure or a maximum storage duration (e.g., 8 hours) in seconds: then browsers will only include it in requests to URLs starting with Set-Cookie: sid=hJsndj47Sd8sl3hiu; Max-Age=28800 https://www.cl.cam.ac.uk/~mgk25/ Servers can delete cookies by sending a new cookie with the same name, Domain and Path values, but an Expires value with a time in the past. Explicitly specifying a domain, as in HTTP state management mechanism, https://tools.ietf.org/html/rfc6265 Set-Cookie: lang=en; Path=/; Domain=cam.ac.uk Privacy-friendly browsers offer additional restrictions: returns this cookie to all servers in sub-domains of cam.ac.uk . ◮ user confirmation before storing long-term cookies (e.g., lynx ) If a browser receives a new cookie with the same name, Domain value, and Path value as a cookie ◮ erase cookies at the end of the session (incognito tabs, Tor browser) that it has already stored, the existing cookie is evicted and replaced with the new cookie. ◮ reject “third-party cookies”, set by other servers from which Browsers store and return multiple cookies of the same name, but different Domain or Path values. resources are loaded (e.g., advertisement images) Browsers will reject Domain values that do not cover the origin server’s hostname. Some will also reject public suffixes, such as “com” or “ac.uk” ( https://publicsuffix.org/ ). 9 10 HTTP redirects HTTP basic authentication HTTP supports a simple password mechanism: A HTTP server can respond with a 3 xx status code and a Location: $ nc -C www.cl.cam.ac.uk 80 field to send the client elsewhere for the requested resource: GET /~mgk25/hello-basic.html HTTP/1.0 $ nc -C www.cl.cam.ac.uk 80 ֓ ← GET /admissions/phd/ HTTP/1.0 HTTP/1.1 401 Unauthorized ֓ ← Date: Tue, 20 Feb 2018 19:34:15 GMT HTTP/1.1 301 Moved Permanently Server: Apache/2.4.18 (Ubuntu) Location: https://www.cst.cam.ac.uk/admissions/phd/ WWW-Authenticate: Basic realm="Security II demo" Content-Length: 331 [. . . ] Content-Type: text/html; charset=iso-8859-1 $ python -c'import base64;print base64.b64encode("guest:gUeSt")' ֓ ← Z3Vlc3Q6Z1VlU3Q= <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> $ nc -C www.cl.cam.ac.uk 80 <title>301 Moved Permanently</title> GET /~mgk25/hello-basic.html HTTP/1.0 [...] Authorization: Basic Z3Vlc3Q6Z1VlU3Q= 301 “Moved Permanently” – better update that hyperlink ֓ ← HTTP/1.1 200 OK 302 “Found” – temporary new link, no need to update it Content-Type: text/html; charset=utf-8 303 “See Other” – go there, but it may not yet be what you wanted ֓ ← <!DOCTYPE html> 11 12

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend